#30029: Objective 2, Activity 5: POC for Human-memorable addresses for .onion services --------------------------------------+-------------------------------- Reporter: pili | Owner: tbb-team Type: project | Status: new Priority: Medium | Milestone: Component: Applications/Tor Browser | Version: Severity: Normal | Resolution: Keywords: | Actual Points: Parent ID: #30281 | Points: Reviewer: | Sponsor: Sponsor27-must --------------------------------------+--------------------------------
Comment (by cypherpunks): Responding to the title of this ticket, which includes 'Human-memorable addresses for .onion services': we must be careful to consider Zooko's trilemma, which argues that names cannot be human-meaningful, global, and secure. In particular, we must not seek to re-implement something like DNS, whose requirement of universality implies the creation of hierarchy, authorities, and control points, all of which undermine a salient benefit of onion services, the ability for all individuals to create and use them freely. Consider the implicit role for authorities in any [https://sockpuppet.org/blog/2015/01/15/against-dnssec/ effort to secure DNS]. As an alternative, we might consider adopting an approach more like [http://www.skyhunter.com/marcs/petnames/IntroPetNames.html Petnames], which encourages individuals to create and use their own meaningful names for opaque identifiers, without requiring everyone to agree. We might also want to create tools to help users track the provenance of addresses learned via introductions, so that they would be empowered to make decisions based upon the trustworthiness of those who provided introductions. We could likewise encourage individual users to establish multiple identities for their own services this way and use different addresses based upon context. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30029#comment:3> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs